Male Rep 4

 

 "There is only one Boss. The Customer"

Have IT Questions?
Call us now (888) 894-6411

Blog

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Google VoIP Microsoft Email Mobile Devices bgc Software roundup nonprofit Data Managed IT Services Alert Disaster Recovery Business Business Continuity Outsourced IT Internet Innovation Hardware Smartphones communications Windows 10 IT Services Ransomware Tech Term Cybercrime Android Browser Managed IT Services Data Backup Saving Money Computer Efficiency IT Support Computers Cloud Computing Server Small Business Network Windows BDR Passwords Internet of Things User Tips Save Money Office Business Management Productivity Data Recovery Smartphone BYOD Quick Tips Cybersecurity IT Support Money Social Engineering Recovery Mobile Device Management Managed IT Miscellaneous Telephone Systems Work/Life Balance Artificial Intelligence Virtualization Collaboration Applications Phishing Gadgets Social Media Mobility Productivity Communication Vulnerability Hacking Upgrade Law Enforcement Facebook Wi-Fi Password Router How To Holiday Office Tips VPN Office 365 Avoiding Downtime Compliance Remote Monitoring Chrome Proactive IT Health Private Cloud Bandwidth Bring Your Own Device Data Protection Flexibility Microsoft Office Two-factor Authentication Budget Firewall Automation App Managed Service Provider Safety History Value Identity Theft Black Market Connectivity Business Intelligence Operating System Workplace Tips Word Remote Computing HaaS Redundancy Data Breach Windows 10 Mobile Device Apps Google Drive Information Technology Data Security IT Plan Electronic Medical Records Servers Update Business Owner Physical Security Information CES Worker Emergency Employer-Employee Relationship Big Data Document Management Encryption Credit Cards Spam Blocking End of Support Content Management The Internet of Things SaaS Legal Hiring/Firing Data storage Save Time Windows 7 HIPAA Cleaning Blockchain Spam Risk Management Training Workers Unsupported Software Data Storage Website Automobile Computer Care Sports PDF Patch Management Government OneNote Solid State Drive Mobile Computing Computing Infrastructure IT Management Data Management Marketing USB Infrastructure Paperless Office Samsung Scam Wireless Technology Keyboard Charger YouTube Comparison Entertainment Battery Content Filtering Multi-Factor Security Hosted Computing Remote Worker Leadership Online Shopping Troubleshooting Password Manager Machine Learning Audit Digital Signature Transportation Current Events Tip of the week Scalability Experience Apple Cache Data loss Internet Exlporer Cryptocurrency Public Computer HBO Specifications Tools Theft Education Computer Fan Trending Inventory Wiring Flash Evernote Business Mangement HVAC Loyalty Screen Mirroring WiFi Techology Managed Service Benefits Knowledge Windows Server 2008 iPhone Wireless Internet Unified Threat Management Safe Mode Outlook Millennials Devices Rootkit FENG Data Warehousing Lifestyle Access Control Sync Wireless Charging Shadow IT Books User Error Gmail Networking Cast Google Docs Wireless Accountants MSP Smart Technology Network Congestion Chromecast Fraud Instant Messaging Downtime Cortana Wire Windows 10s Laptop Users Reputation Advertising Virtual Assistant Workforce Thought Leadership Mobile Enterprise Content Management Best Practice Content Hard Drives Authentication Employer Employee Relationship webinar Telephony Fiber-Optic Hosted Solution Monitor Colocation Recycling File Sharing Two Factor Authentication Regulations Amazon Search Robot Google Apps Smart Office Public Cloud Touchpad Virtual Reality Customers Human Resources Telephone System IBM NarrowBand Frequently Asked Questions Telecommuting Politics Twitter Vendor Management Professional Services eWaste Password Management Assessment Software Tips Audiobook Relocation Nanotechnology Computer Accessories Conferencing Skype Cables Voice over Internet Protocol Practices Augmented Reality IT Consultant Amazon Web Services How to Files Worker Commute Staff Regulation Supercomputer Excel Remote Work Addiction Settings Going Green Meetings Software as a Service Hacker Criminal NIST Television CrashOverride Video Games Humor Smart Tech Bluetooth Netflix Start Menu Unified Communications Thank You Congratulations nonprofits